CVE-2024-46292

A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue).
Configurations

No configuration.

History

21 Oct 2024, 00:15

Type Values Removed Values Added
References
  • () https://modsecurity.org/20241011/about-cve-2024-46292-2024-october/ -
Summary (en) A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. (en) A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue).

10 Oct 2024, 12:51

Type Values Removed Values Added
Summary
  • (es) Un desbordamiento de búfer en modsecurity v3.0.12 permite a los atacantes provocar una denegación de servicio (DoS) a través de una entrada manipulada insertada en el parámetro de nombre.

09 Oct 2024, 17:35

Type Values Removed Values Added
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

09 Oct 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-09 16:15

Updated : 2024-10-21 00:15


NVD link : CVE-2024-46292

Mitre link : CVE-2024-46292

CVE.ORG link : CVE-2024-46292


JSON object : View

Products Affected

No product.

CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')